Affiliation:
1. Beijing University of Posts and Telecommunications, China
2. Sichuan University, China
3. University of Notre Dame, USA
Abstract
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society. Securing cyberspace has become an utmost concern for organizations and governments. Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities. In recent years, with the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance. It is imperative to summarize existing graph-based cybersecurity solutions to provide a guide for future studies. Therefore, as a key contribution of this paper, we provide a comprehensive review of graph mining for cybersecurity, including an overview of cybersecurity tasks, the typical graph mining techniques, and the general process of applying them to cybersecurity, as well as various solutions for different cybersecurity tasks. For each task, we probe into relevant methods and highlight the graph types, graph approaches, and task levels in their modeling. Furthermore, we collect open datasets and toolkits for graph-based cybersecurity. Finally, we outlook the potential directions of this field for future research.
Publisher
Association for Computing Machinery (ACM)
Reference246 articles.
1. Graph regularization methods for web spam detection;Abernethy Jacob;Machine Learning,2010
2. Ahmed Abusnaina , Aminollah Khormali , Hisham Alasmary , Jeman Park , Afsah Anwar , and Aziz Mohaisen . 2019. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems . In ICDCS. IEEE , 1296–1305. Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen. 2019. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In ICDCS. IEEE, 1296–1305.
3. Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013. Opinion Fraud Detection in Online Reviews by Network Effects . The AAAI Press . Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. The AAAI Press.
4. Graph based anomaly detection and description: a survey;Akoglu Leman;Data Min. Knowl. Discov.,2015
5. Ibrahim Alabdulmohsin YuFei Han Yun Shen and Xiangliang Zhang. 2016. Content-agnostic malware detection in heterogeneous malicious distribution graph. In CIKM. Ibrahim Alabdulmohsin YuFei Han Yun Shen and Xiangliang Zhang. 2016. Content-agnostic malware detection in heterogeneous malicious distribution graph. In CIKM.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献